Account takeover (often abbreviated as ATO) is a compromise where a user has lost control of their authentication credentials resulting in them being exposed to malicious actors. These credentials are then used to commit data theft, fraud, and other ...
“We had 100 signups today!” is one of the most beautiful things you can hear as a young startup. It’s a sign that you’re doing something right. Your product solves a real problem. Your marketing is getting in front of the right people. Your signup fl...
In a world where hackers are trying to brute force user accounts (23andMe breach 2023), it is vital for developers to maintain a long-lasting and tamper-proof audit log of all authentication events to keep their apps secure. While many companies use ...
I’ve lost count of how many RSA Tokens, Yubikeys, and the like I’ve collected, lost, misplaced, replaced, and cursed over the years. While they’re exceptionally secure, they’re a pain for both administrators to deploy and users to keep track of. Eith...
Passkeys, passkeys, passkeys! Everyone's talking about them. With Amazon rolling out passkeys last year and Google encouraging users to make them the default authentication method, it raises the question: How do I add them to my app? How do passkeys ...
To Me, hackathons embody the excitement of the possible. Until the last submission comes in you never know what amazing works of art will come through and how it can open your eyes to solving problems in creative and unique ways. Even after my experi...
If you are looking to add passkeys to other languages or frameworks, follow these tutorials: Next.js Django Passkeys, passkeys, passkeys! Everyone's talking about them. With Amazon rolling out passkeys last year and Google encouraging users to m...
In today's app-centric landscape, security is fundamental. While there isn't a single portion of our life untouched by technology, we're still stuck with the decades-old security practices of passwords. At Pangea, we're excited to improve our custome...
In today's interconnected digital landscape, ensuring the security of online identities and data is paramount. As businesses and organizations expand their online presence, the need for robust authentication mechanisms becomes more crucial. This is w...
This is a guest blog by Jonathan Cheshire who is an independent contributor. They are in their final year as Computer Science (BSc) student, and occasional freelance Software Engineer. I was recently tasked with rebuilding the backend system for AirD...
In the world where hackers are trying to brute force user accounts (23andMe breach 2023) and session tokens are being stolen (OKTA breach 2023) to impersonate authenticated users and run critical user actions, it is highly important for developers to...
When I say “secure authentication,” what comes to mind? You probably think of SSL, password policies, and MFA. Those are a good starting point but what if we could look into the authentication request itself? What if we could use that request context...
We’re excited to announce that Pangea has added Authentication (AuthN) to our Security Platform as a Service (SPaaS). This is a major step for us as we aim to deliver a comprehensive set of services that any developer can use. So let’s dive in and co...
SOC 2 Type 2
HIPAA Compliant
ISO/IEC 27001
ISO/IEC 27701
Use Cases
Case Studies
Services
Developers
Explore
Connect
Service Status
Company
636 Ramona St, Palo Alto, CA 94301
Pangea is a Sample Vendor for Composable Security APIs in the 2024 App Sec Hype Cycle™ report